The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.
A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.
The U.S. Special Operations Command is taking an unconventional approach to equipping its forces for an information environment that does not follow conventional guidelines. The command must provide networking for a theater force that can range from one person up through thousands of people, and it faces diverse mission needs that can require large communications pipes.
The Defense Logistics Agency is charging full speed into an infocentric environment that will include mobile technologies, changing the way the agency operates. Part of this effort includes the agency’s own version of the Joint Information Environment, which will help improve interoperability.
The U.S. Transportation Command moves more information than it does any physical commodity, and this development has redefined the command's security requirements. These requirements are complicated by the presence of commercial providers whose presence poses potential cyberspace vulnerabilities.
Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials said during AFCEA’s JIE Mission Partner Symposium.
The battle against cybermarauders begins with individual home computers, said Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command (NORTHCOM), and deputy J-3 for cyberspace operations at NORAD, during a panel presentation on the second day of AFCEA's three-day JIE Mission Partner Symposium.
The architecture of the Joint Information Environment (JIE) will help the Defense Department deal with the growing insider threat, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA). He told the audience at AFCEA’s three-day Joint Information Environment Mission Partner Symposium that the move to the cloud will enable better security and prevent the traditional insider threat from menacing valuable data.
The Defense Information Systems Agency (DISA) is changing its own internal methods of operation to reflect the direction it is giving the services in the move toward the Joint Information Environment, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, at the Joint Information Environment Mission Partner Symposium.
The defense community must move away from email and fully into social media, says the director of the Defense Information System Agency (DISA). Lt. Gen. Ronnie D. Hawkins Jr., USAF, told the audience at AFCEA’s Joint Information Environment Mission Partner Symposium that the defense community must break with the past in digital information technology.
The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.
Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.
China and Russia represent two of the most robust, comprehensive concerns to worldwide stability. Almost every major geostrategic threat—cyber attack, nuclear weapons, ballistic missiles, capable military forces, political influence, economic power, sources of and high demand for energy—is resident in those two countries that often find themselves at odds with the United States and its allies.
A new facility for cybersecurity is allowing U.S. Forces Korea to coordinate efforts with other U.S. commands as well as Republic of Korea civilian government and military forces. The Joint Cyber Center serves as the focal point for increasing international cooperation between U.S. and Korean forces in their defensive measures against increasing cyber aggression from North Korea. It blends activities from the local J-2, J-3 and J-6 along with input from other forces worldwide.
The first graduates are emerging from centers of excellence for cyber operations that teach the in-depth computer science and engineering skills necessary to conduct network operations. The program better prepares graduates to defend networks and should reduce the on-the-job training needed for new hires, saving both time and money.
Cybersecurity and Cyberwar: What Everyone Needs to Know
By P.W. Singer and Allan Friedman Oxford University Press, January 2014 (Brookings)
Much is written today about cybersecurity, cyberwarfare and cyberstrategy. Now a new compendium, written by two Brookings Institution academics, offers a serious and intelligent discussion of these overlapping themes and what they the mean to politics and defense discourse in the United States.
Whether a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a little help navigating the cumbersome and technical systems. This snapshot features pointers to clarify existing guidance and help organizations manage cybersecurity risk.
Gadgets and gizmos are not the only things beset by the U.S. Defense Department’s continued battle with shrinking budget dollars. While some projects may be delayed, and others even derailed, the civilian work force “is now showing the early signs of stress,” Alan Shaffer, acting assistant defense secretary for research and engineering, recently warned Congress.
Furloughs, the government shutdown and sequestration, and decreasing budgets have an adverse impact on the 100,000 personnel that make up the Defense Department’s science and technology (S&T) work force.
Anyone following the progress of the Joint Information Environment (JIE) knows by now that it is not a program of record. No one will see large procurements to provide the JIE. It definitely is a framework: it defines standards and architectures for consistency across the defense environment. It defines a core environment and interfaces for the connection of networks and systems to the core.
The Defense Department drive toward its Joint Information Environment is picking up speed as it progresses toward its goal of assimilating military networks across the warfighting realm. Individual services are developing solutions, some of which are targeted for their own requirements, that are being applied to the overarching goal of linking the entire defense environment.